CISA Certified Information Systems Auditor – Question1607

The FIRST step in a successful attack to a system would be:

A.
gathering information.
B. gaining access.
C. denying services.
D. evading detection.

Correct Answer: A

Explanation:

Explanation:
Successful attacks start by gathering information about the target system. This is done in advance so that the attacker gets to know the target systems and their vulnerabilities. All of the other choices are based on the information gathered.